Mario and pals are coming back to UK Happy Meals this week

Officially starting the day of stated broadcast, January 11th in the UK (sorry fellow Yanks, we’re acquiring left out this time), there will be two new toys in every meal a week, for 4 weeks. Mario and Yoshi are the initial offerings, with Princess Peach and a red shell on offer for week two. Bowser and a star block with bricks are on tap for the third week while Luigi and a Piranha Plant round out the collection.

As VG247 writes, these toys have become anything of an annual UK tradition considering that their first look in 2014. Nintendo’s timing for 2017, nonetheless, is virtually assuredly intentional right here. Right after all, stopping by McDonald’s soon after your Switch demo and bringing house a Nintendo-themed keepsake seems also best to be an accident.

Engadget RSS Feed

UK vinyl sales created far more money than music downloads last week

Figures show that for the duration of week 48 of 2016, shoppers spent £2.4 million on vinyl, although downloads took £2.1 million. Examine that to the exact same period last year when £1.two million was spent on records, with digital downloads bringing in £4.four million. The ERA puts the surge in sales down to recent buying events like Black Friday and the recognition of the format as a Christmas gift. It is also helped by the fact that Sainsbury’s and Tesco now stock records in a lot of of their branches.

It really is welcome news for vinyl lovers and the music business in common, but digital music is also going from strength to strength. As an alternative of buying music to keep, Brits are increasingly turning to streaming services like Spotify to get their music repair. Last weekend, The Weeknd broke streaming records on Spotify after his new album was streamed 40 million instances on day a single and 223 million occasions in its 1st week.

It’s also worth contemplating that vinyl albums are usually a lot more pricey than downloads. BBC News reports that last week’s biggest-selling vinyl was Kate Bush’s triple-disc live album Just before The Dawn, which expenses about £52. The same album is £13 on Amazon. Downloaded albums are nonetheless much more well-liked, although: last week saw 295,000 digital downloads versus 120,000 vinyl album sales.

Current study suggests that some people do not even get vinyl to listen to, with 7 percent of collectors admitting they don’t own a record player. It’s believed that some purchase records to support assistance artists they like, although other folks might use the sleeves to decorate their property.

Engadget RSS Feed

Safety News This Week: What Trump’s Win Implies for Cybersecurity

Last month, we at WIRED posed the hypothetical: “Imagine if Donald Trump Controlled the NSA.” The notion at the time seemed unlikely but disturbing: A man who had known as for his political opponent, Hillary Clinton, to be jailed who casually stated, “I wish I had that power,” when asked about his invitation to Russian hackers to dig up her old emails who even reportedly eavesdropped on calls in between guests and employees at his Mar-a-lago hotel, would handle the world’s most powerful surveillance capabilities.

We won’t have to imagine that scenario for considerably longer: In two months, it will be a reality.

As the shockwaves of Trump’s victory rippled across the globe, WIRED has scrambled to capture what it means for the realm of hackers and spies: Safety and foreign policy analysts warned that it would only embolden the Russian hackers who injected chaos into the presidential campaign and the Democratic party. Election day itself got a taste of alt-proper hacking, as an anonymous poster on 4Chan appeared to target a Clinton get-out-the-vote telephone bank—but inadvertently hamstrung each Democrat and Republican calling efforts. Edward Snowden and other privacy activists warned that the surveillance powers expanded beneath Obama could be abused by Trump and referred to as for Americans to use encryption tools to defend themselves. And WIRED provided a primer on how Trump will reshape national security policy, including his probably assistance for the Syrian regime of dictator Bashar Al-Assad.

And there was a lot more. Every Saturday we round up the news stories that we didn’t break or cover in depth but that nonetheless deserve your consideration. This week we’re focusing on the security ramifications of Trump’s win. As constantly, click on the headlines to read the complete story in each and every hyperlink posted. And as often, keep protected out there.

Silicon Valley Is Worried Trump Will Demand Their Data

The battles Silicon Valley has fought with Obama’s Justice Department over iPhone and Whatsapp encryption may possibly have just been a dress rehearsal. Tech firms now worry Trump’s DOJ would make even far more intrusive demands that they hand over users’ private information. Two tech companies told Buzzfeed, for instance, that they have been considering moving their servers and even headquarters out of the US to location them beyond the legal reach of a Trump administration. Trump, soon after all, known as for a boycott against Apple when it refused to write application to aid the FBI crack its iPhone encryption earlier this year.

Rudy Giuliani Eyes Cybersecurity Post in Trump Administration

Former New York City mayor Rudolph Giuliani told Fox News on Thursday that he would “love to turn out to be the individual that comes up with a remedy to cybersecurity” in the Trump administration. After functioning as a federal prosecutor in the 1980s and serving as NYC mayor, Giuliani and a couple of members of his mayoral administration began the management and safety consulting firm Giuliani Partners in 2002. More recently he became head of the cybersecurity and crisis management practice at the law firm Greenberg Traurig. This may explain his seemingly out-of-the-blue need to work on federal cybersecurity initiatives. But provided the allegations of cronyism surrounding Giuliani Partners detailed in a 2007 Washington Post investigation, Giuliani has at occasions seemed much more interested in profiting from cybersecurity troubles than solving them.

Russian Hackers Stick to Trump’s Win With A lot more Cyberattacks

Significantly less than 24 hours right after WIRED reported that experts have been warning Trump’s victory would lead to more Russian political hacking, a series of attacks surfaced. In the wake of Trump’s victory speech, the same Kremlin-linked hackers who are believed to have attacked the Democratic National Committee started targeting would-be victims at American universities, feel tanks, the State Department and Radio Cost-free Europe. The attacks employed malware-laced phishing emails purporting to have information about the election, according to Motherboard, which was forwarded 1 of the messages. The malware they contained, hidden in image files, was designed to produce stealthy backdoors into the computers of any person who opened them.

How to Safeguard Oneself Online in Trump’s America

Provided fears of increased domestic surveillance beneath Trump, privacy activists are advising that Americans adopt encryption and privacy tools—particularly journalists, activists, and anyone else who plans on opposing the administration’s policies. Those safety tips, of course, are not really any different than they were just before Tuesday: Use encrypted texting and calling apps like Signal, the anonymity software program Tor when achievable, powerful passwords generated by a password manager, two-issue authentication, HTTPS-encrypted internet sites, and in general, the services of companies, like Apple, that have opposed government invasions of privacy rather than those, like Yahoo, that have recently caved to broad spying demands.

Trump Will Inherit Surveillance Powers Enshrined By Obama

Amid all the anti-Trump sentiment from the privacy community, it is worth remembering that Obama shares considerably of the blame for the surveillance powers Trump will now wield. As Freedom of the Press Foundation Executive Director Trevor Timm writes in a column for the Guardian, Obama had the chance to repudiate the expansion of surveillance powers that occurred beneath Bush. Just as Obama chose to “look forward, not backward” when it came to punishing the illegal torture and human rights abuses that occurred below the earlier administration, Timm argues that Obama failed to sufficiently scale back the spying powers of the NSA, even right after Snowden’s revelations. Now these vast powers will be in the hands of, as Timm puts it, “a maniac.” He writes that “it will go down in history as probably President Obama’s most catastrophic mistake.”

Lily Hay Newman contributed to this story.

Go Back to Best. Skip To: Begin of Write-up.


Safety News This Week: Congress Celebrates the Snowden Film by Slamming Snowden

Clinton and Trump aren’t the only ones campaigning this fall. The ACLU, Human Rights Watch, and Amnesty International came together this week in a renewed initiative to get whistleblower Edward Snowden pardoned by the Obama administration prior to he leaves workplace in January. Conveniently, Snowden, the biopic directed Oliver Stone, opens this weekend and portrays Snowden in an really positive light. As you’ll see in our news roundup beneath, nevertheless, Congress is far from convinced.

The New York Lawyer General’s office announced that it’s cracking down on websites for children that illegally track browsing. Meanwhile, the Justice Division is working to expand the scale and scope of law enforcement’s malware distribution and hacking. And it turns out that the FBI, regardless of its claims to the contrary, likely could have hacked one of the San Bernardino shooters’ iPhones without having the cooperation it demanded from Apple. With an attack on the Planet Anti-Doping Agency, Russian hackers seemed to be obtaining even a lot more more brazen than in their hack of the Democratic National Committee. In a long-awaited choice, a U.K. judge ruled that activist Lauri Adore should be extradited to the U.S. to face hacking charges. And malicious third-party iOS app retailers are distributing adware-laced Pokémon Go apps to millions of iPhones. (See a lot more Pokémon Go-connected malware under.) Oh, and it turns out that pixelating or blurring photos to obscure the individuals and objects in them can be defeated by modern machine understanding tactics. Not extremely comforting for all those unwilling guest stars on COPS.

And there’s much more: Every single Saturday we round up the news stories that we didn’t break or cover in depth but nevertheless deserve your focus. As often, click on the headlines to read the full story in each link posted. And keep secure out there.

Home Intel Committee Slams Snowden in Leak Investigation Report

Three years soon after Edward Snowden walked out of the NSA with a trove of its secrets and flew to Hong Kong, the Property Permanent Choose Committee on Intelligence has released the very first glimpse of its investigation into the fallout. And how convenient that it arrived 24 hours just before the opening weekend of Snowden, the Hollywood film directed by Oliver Stone that portrays the young whistleblower as a full-blown hero. “Edward Snowden is no hero – he’s a traitor who willfully betrayed his colleagues and his country,” committee chair Devin Nunes wrote in a statement accompanying the three-web page report. It accuses Snowden of faking efficiency critiques, lying about breaking his legs in Army education, and copying 1.5 million documents, therefore endangering national safety. In his Twitter feed and through his lawyer, Snowden denied most of those points. He wrote that he hadn’t really faked a functionality overview but alternatively reported a security vulnerability in the overview system, and that he’d spent weeks convalescing for his leg injuries in an Army health-related center ahead of walking out on crutches. As for the 1.5 million documents, his ACLU lawyer, Ben Wizner, referred to as the tally “nonsensical,” saying that the NSA had overestimated the number because it couldn’t figure out how many files Snowden had copied.

Justice Division OKs FBI’s Impersonation of AP Journalist

In 2007, the FBI impersonated an Connected Press editor to communicate with a suspected supply of a higher school bomb threat, tricking him into opening an e mail attachment that planted malware on his laptop and revealed the 15-year-old’s location. When the incident was disclosed by the Seattle Occasions seven years later, the AP and several newspapers protested the tactic, which could inhibit the press’ ability to do its operate without suspicion. Now the Division of Justice’s Office of the Inspector General has released the benefits of its investigation into the incident and basically declared the move kosher. “FBI policies did not prohibit the practice of agents impersonating journalists, nor was there any requirement that agents seek unique approval to engage in such practice,” the report states. The AP responded that it is “deeply disappointed” in the choice, which “compromises the capacity of a free of charge press to collect the news safely and successfully and raises critical constitutional issues.” The FBI, for its component, has because changed its policy to prohibit impersonation of the news media.

Swedish Court Preserves Arrest Warrant in Julian Assange Sexual Assault Case

A Swedish appeals court upheld Julian Assange’s six-year-old arrest warrant, right after he challenged it again. The WikiLeaks founder has spent far more than three years living in the Ecuadorian Embassy in London since he claims that going to Sweden would put him at threat for getting extradited to the U.S. on espionage charges related to classified data WikiLeaks has published. The arrest warrant is aimed at interrogating Assange he hasn’t been formally indicted. The statute of limitations for the case is 10 years and will expire in 2020 if Swedish prosecutors do not indict him by then, but they say that they are operating to advance the case and Assange is scheduled to be interrogated by Ecuadorian officials on behalf of Swedish law enforcement in October.

Hacker Breaches Science News Embargo Site EurekAlert!

Last week a hacker compromised all the login credentials of the science news service EurekAlert!, which journalists and public details officers user to access new research papers in advance of their publication. A German journalist notified EurekAlert! of the breach following the hacker attempted to sell him login credentials for the web site. The attacker also released two news releases ahead of their embargo dates. EurekAlert, which is a division of the American Association for the Advancement of Science, took its internet site off line, and it’s been down since Tuesday evening. The service says that it has “rebuilt the EurekAlert! technique environment” and hopes to reinstate the internet site more than the weekend. When it’s live once more, the internet site says that all passwords will be reset.

Criminals Snuck a Trojan Into the Google Play Retailer By Disguising it as a Pokémon Go Guide

Kaspersky Lab not too long ago notified Google that an app named “Guide For Pokémon Go” was truly a malicious Trojan lurking in its Play store. Customers downloaded the app far more than 500,000 occasions prior to the researchers caught it, and it infected at least 6,000 phones with malware. When downloaded, the method appeared to offer you real tips about Pokémon Go, but it also scanned its host device checking to see regardless of whether it was a private individual’s phone or a test unit employed to detect malicious attacks. Only if the environment seemed protected did the Trojan commence downloading other malicious files. Kaspersky Lab discovered that, for now, the criminals operating the attack use the Trojan to place adware on victims’ phones, but the researchers caution that the same program could simply be employed to inject ransomware or other much more damaging and intrusive malware.

Google Gives $ 200,000 Bug Bounty for Ideal Android Attack

Apple apparently raised the bar for bug bounties when in August it announced a $ 200,000 reward for any white-hat hacker who tells the organization about a previously unknown complete takeover approach for iOS devices. Now Google is matching that sum—for at least 1 fortunate hacker. In a new contest it’s calling the Project Zero Prize, the company will spend out $ 200,000 to the hacker or group of hackers that submits the very best sequence of vulnerabilities that can totally compromise an Android phone. (Modern day hacking techniques usually call for not a single bug, but several linked with each other to defeat all the protections of a device’s operating method.) The runner-up will get $ 100,000, and other worthy entries will every single acquire $ 50,000. For now, only Nexus 6P and Nexus 5x phones are valid targets—after all, why bother digging up brilliant hackable vulnerabilities in the majority of other Android phones when their users do not get patches for them?

Go Back to Top. Skip To: Begin of Report.


Security News This Week: Google Ups the Ante on Web Encryption

As the presidential campaign charges ahead, the saga of Hillary Clinton’s use of a private e mail server continues. Fresh criticism emerged this week that Clinton must have been hiding terrible things simply because one particular of her aides smashed two of her personal Blackberrys with a hammer. But from a data safety point of view, that is not a poor issue in reality some professionals say the discarded devices ought to have been destroyed a lot more thoroughly. Meanwhile, Property Oversight Committee leader Elijah Cummings released a 2009 e mail sent by former Secretary of State Colin Powell to Clinton in which he describes in detail all the ways he himself skirted State Division technology specifications.

This week we grappled with the query of why Baltimore has turn into a bastion of surveillance tech. Over in the private sector, the Google-owned tech incubator Jigsaw is developing a program to try to identify ISIS recruits and deter them from joining the organization. And an op-ed contributor says it is time to acknowledge that whoever wins the presidency will need to set new policy for autonomous weapons systems and their scope of use in warfare when the old Department of Defense Directive expires in 2017.

But wait, there’s more: Each and every Saturday we round up the news stories that we didn’t break or cover in depth but still deserve your consideration. As always, click on the headlines to study the full story in each and every hyperlink posted. And remain protected out there.

Google Will Mark Unencrypted Websites “Insecure”

Not too extended ago, the normal for a secure site was to not offer gaping holes for hackers to exploit or infect guests with malware. Now even plain-old HTTP itself, that venerable web protocol, is about to be deemed insecure. Google has announced that its net browser Chrome will soon take a a lot more aggressive stance on web encryption, marking any site as insecure if it does not use HTTPS, a protocol that encrypts web pages with the encryption schemes SSL or TLS, and putting a red “X” more than a padlock in the corner of the address bar. The rollout will start in January by applying the rule to any web site that asks for a password or credit card details. It will later expand to all sites when the user is browsing in Chrome’s incognito mode. At some point, Chrome will label all HTTP web sites as insecure. In other words, the web giant is taking a giant step toward a fully encrypted net and placing anybody who isn’t taking HTTPS seriously on notice: If your web site isn’t currently encrypted, start off functioning on it or turn into the topic of shaming messages in millions of users’ browsers.

Healthcare Gear Organization Sues Firm That Traded on Its Hackable Bugs

In the extended history of controversies more than hackers who locate and publicize hackable bugs, the case of St. Jude Healthcare and the finance firm Muddy Waters might be one particular of the messiest. Last month Muddy Waters and the security analysis firm MedSec teamed up to expose what they described as flaws in St. Judge’s pacemakers and defibrillators that could put patients’ lives in danger, potentially bricking the healthcare implants. And they went a step further: Muddy Waters also short-sold St. Jude’s stock, then profited from the resulting drop after the expose went public. Now St. Jude is firing back with a lawsuit accusing both the hackers and traders of illegal and damaging behavior like industry manipulation and false accusations. Meanwhile, researchers at the University of Michigan published a rebuttal to MedSec prior to the lawsuit, claiming to refute some of the vulnerabilities MedSec identified.

Congress Concerns Damning Post-Mortem on OPM Breach

A hacker breach of the Office of Personnel Management that was revealed last year was the worst cyber attack on a federal agency in current history, exposing as numerous as 22 million federal employees’ private records. Now a group of Republican members of Congress has released the results of its investigation into the attack and areas the blame squarely on the agency’s management. The detailed postmortem runs through a series of known, unfixed safety vulnerabilities in the agency’s systems prior to its discovery of hackers compromising its network in 2014 and describes how after OPM identified the initial breach and focused on containing the intrusion, another group of hackers ran rampant by means of its systems, ultimately stealing millions of the very individual background check records. The report lists the agency’s obstructions of the Office of the Inspector Common, which investigated the breach, along with OPM’s misleading statements to Congress about its technologies setup and security measures.

White House Names Very first Federal Chief Information Safety Officer

As component of the Obama administration’s $ 19 billion Cybersecurity National Action Strategy, the White Home appointed its very first federal chief information security officer. The position will be filled by retired Brigadier General Gregory J. Touhill, who was previously deputy assistant secretary for cybersecurity and communications in the Division of Homeland Security’s Office of Cybersecurity and Communications. As CISO he will report to Tony Scott, the federal chief information officer. Touhill’s aim will be to enhance government network safety, evaluate security measures at agencies across the government, and raise awareness nationally about the significance of cybersecurity. It’s not going to be an effortless job if he does it correct.

DDoS-For-Hire Service Hacked, Revealing Shady Dealings and Customer Information

The Isreali “booter” service vDOS, which offered to wage distributed denial-of-service (DDoS) attacks for its clients, was itself hacked, exposing information about tens of thousands of buyers and targets. The hack also leaked details about the business itself. Amongst April and July 2016, vDOS generated more than 277 million seconds of attack time, or practically nine years of malicious traffic, by maintaining a number of attack campaigns every day. As Krebs on Security puts it, “To say that vDOS has been accountable for a majority of the DDoS attacks clogging up the World wide web over the past few years would be an understatement.” The organization was breached by a hacker who had discovered a vulnerability in the server configuration data of another attack firm. He attempted it on vDOS and it worked, allowing him to exploit an additional bug that gave him access to the company’s databases. vDOS has created over $ 600,000 in the previous two years. Go Back to Leading. Skip To: Commence of Write-up.


Space Photographs of the Week: Star Shrapnel Comin’ Via!

Click by way of the gallery to see this week’s assisting of the greatest the universe has to supply. And if you want a lot more when you’re accomplished but can’t wait until the subsequent one particular, here’s the whole collection.

Go Back to Best. Skip To: Commence of Write-up.